Static task
static1
Behavioral task
behavioral1
Sample
65b48b56c064d4c6e5245a1ac33ff48615b04449e9301677214c92b9bb8207b2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
65b48b56c064d4c6e5245a1ac33ff48615b04449e9301677214c92b9bb8207b2.exe
Resource
win10v2004-20220901-en
General
-
Target
65b48b56c064d4c6e5245a1ac33ff48615b04449e9301677214c92b9bb8207b2
-
Size
356KB
-
MD5
cf088bda019261f9959f7f6e98971596
-
SHA1
b71625e9362a6b43cc065356b868d2ff609291bb
-
SHA256
65b48b56c064d4c6e5245a1ac33ff48615b04449e9301677214c92b9bb8207b2
-
SHA512
22cc292b6c39eb5584e012bc5653e28d8019892f40da8a892f9e9e8c91d5c6c7c9ab2d21392137107ac537b756330899d9909f3a005a7c65459bc3106cde8ca7
-
SSDEEP
6144:lTDbevAuJ0Sqb2tpAC1SCEu8A8AFrV83zbUVYjA1kx69fhiTBJ/NECepUOIssM:lfevAuJ0Sqb23AC1SCEu8A8WrVIzjUPd
Malware Config
Signatures
Files
-
65b48b56c064d4c6e5245a1ac33ff48615b04449e9301677214c92b9bb8207b2.exe windows x86
67a16aaa4ee29df8d802a9789f989c5d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
waveInReset
waveInUnprepareHeader
waveInStart
waveInAddBuffer
waveInOpen
waveInPrepareHeader
waveInClose
mciSendStringA
wsock32
WSACleanup
closesocket
shutdown
getsockname
bind
setsockopt
inet_ntoa
WSAStartup
sendto
recvfrom
connect
WSAGetLastError
ntohs
ntohl
gethostbyaddr
getservbyname
htons
htonl
ioctlsocket
gethostbyname
send
recv
select
__WSAFDIsSet
getsockopt
socket
powrprof
SetSuspendState
gdiplus
GdiplusShutdown
GdipSaveImageToStream
GdipFree
GdipCreateBitmapFromGdiDib
GdipAlloc
GdipGetImageEncodersSize
GdipDisposeImage
GdipCreateBitmapFromFile
GdipGetImageEncoders
GdipCloneImage
GdiplusStartup
avicap32
capCreateCaptureWindowA
iphlpapi
GetAdaptersAddresses
psapi
EnumProcessModules
GetProcessMemoryInfo
EnumProcesses
GetModuleBaseNameA
GetModuleFileNameExA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoA
UnhandledExceptionFilter
FreeLibrary
OutputDebugStringA
GetStdHandle
DuplicateHandle
CreateProcessA
CreateThread
SetNamedPipeHandleState
PeekNamedPipe
CreatePipe
WriteFile
ReadFile
FormatMessageA
LocalFree
GetACP
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetTempFileNameA
GetTempPathA
LocalFileTimeToFileTime
GetExitCodeProcess
GetModuleHandleA
ExitProcess
GetCurrentProcess
GetDriveTypeA
GetTickCount
OpenProcess
TerminateProcess
FileTimeToSystemTime
FindFirstFileA
GetLogicalDriveStringsA
GetLastError
FindClose
GlobalMemoryStatusEx
GetSystemInfo
FindNextFileA
CloseHandle
CreateFileA
SystemTimeToFileTime
SetFileTime
GetVolumeInformationA
GetFileAttributesA
GetEnvironmentVariableA
GetShortPathNameA
SetFileAttributesA
SetProcessWorkingSetSize
GetModuleFileNameA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
Sleep
LoadLibraryA
WaitForSingleObject
InterlockedDecrement
SetThreadPriority
ResumeThread
TlsFree
TlsSetValue
TlsAlloc
GetProcAddress
GetVersionExA
WideCharToMultiByte
MultiByteToWideChar
ExpandEnvironmentStringsA
CopyFileA
SetCurrentDirectoryA
GetWindowsDirectoryA
GetProfileStringA
GetCurrentProcessId
GetCPInfo
IsValidCodePage
GetComputerNameA
GetDiskFreeSpaceA
user32
DdeCreateDataHandle
DdeGetData
DdeFreeDataHandle
DdeUninitialize
DdeQueryStringA
DdeFreeStringHandle
PeekMessageA
WaitForInputIdle
RegisterClassA
GetWindowTextA
FindWindowA
ExitWindowsEx
BlockInput
DdeGetLastError
EnumDisplayDevicesA
GetMessageA
RegisterClassExA
LoadIconA
TranslateMessage
CreateWindowExA
DefWindowProcA
DispatchMessageA
SetWindowTextA
LoadCursorA
MessageBoxA
DestroyWindow
GetWindowRect
GetWindowDC
SendMessageA
GetForegroundWindow
ReleaseDC
GetDesktopWindow
IsWindow
ToAscii
GetKeyState
CallNextHookEx
GetKeyboardState
SetWindowsHookExA
UnhookWindowsHookEx
DdeInitializeA
DdeDisconnect
DdeClientTransaction
DdeCreateStringHandleA
DdeNameService
DdeConnect
DdePostAdvise
GetSystemMetrics
gdi32
CreateCompatibleDC
SelectObject
GetStockObject
CreateDIBSection
BitBlt
DeleteObject
DeleteDC
advapi32
RegEnumKeyA
LookupPrivilegeValueA
CredEnumerateA
AdjustTokenPrivileges
RegCloseKey
RegOpenKeyExA
RegQueryInfoKeyA
RegCreateKeyA
GetUserNameA
RegDeleteKeyA
RegSetValueExA
RegQueryValueExA
RegDeleteValueA
RegEnumValueA
OpenProcessToken
shell32
ShellExecuteA
ShellExecuteExA
SHGetSpecialFolderLocation
SHGetMalloc
SHGetPathFromIDListA
ole32
CoCreateInstance
CreateStreamOnHGlobal
msvcr90
abort
_stricmp
strftime
_mktime64
_gmtime64
bsearch
sscanf
_close
_read
_write
_lseeki64
_telli64
fprintf
_ftime64
atoi
_fdopen
_wassert
?terminate@@YAXXZ
_unlock
__dllonexit
_encode_pointer
?_open@@YAHPBDHH@Z
_open_osfhandle
rename
_getcwd
_rmdir
_mkdir
remove
isalnum
getenv
exit
strchr
ftell
fseek
fflush
fread
ferror
calloc
memset
_beginthreadex
?_set_se_translator@@YAP6AXIPAU_EXCEPTION_POINTERS@@@ZP6AXI0@Z@Z
_vsprintf_p
__CxxFrameHandler3
strtod
strtoul
strtol
isdigit
memmove
realloc
_errno
qsort
isspace
tolower
memcpy
memchr
_time64
fclose
_localtime64
fwrite
_purecall
srand
rand
fopen
strncpy
strncmp
_lock
_onexit
_decode_pointer
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler4_common
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_invoke_watson
_controlfp_s
_strdup
??2@YAPAXI@Z
malloc
toupper
??3@YAXPAX@Z
??_V@YAXPAX@Z
_CxxThrowException
fputs
fputc
sprintf
free
isalpha
__iob_func
Sections
.text Size: 241KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ